Business Continuity and Disaster Recovery

Channel profile:

tactical solutions to help with your BCDR strategy

With the unexpected nature of natural disasters and other disruptive events, preparation is key when it comes to disaster recovery and business continuity processes. Join this channel for live and recorded presentations featuring thought leaders in the field discussing current topics that will help you with tactical solutions to all your BCDR issues.

The devastating impact of Hurricanes Harvey and Irma across Texas and Florida will continue to live long after the waters have receded. How are enterprises, small businesses, government agencies and non-profit organizations prepared for the disruption caused by Harvey and Irma?

If anything, these hurricanes are a stark reminder that all organizations need to have a disaster preparedness and business continuity plans in place to help with recovery from major natural catastrophes.

Join this interactive panel as we discuss:
- The aftermath of Hurricanes Harvey and Irma
- Impact on cybersecurity and how to avoid falling for a Harvey or Irma cyber scam
- Need for business continuity and disaster recovery planning
- Recommendations for crafting the right BCDR strategy and enabling recovery following a disaster

The devastating impact of Hurricanes Harvey and Irma across Texas and Florida will continue to live long after the waters have receded. How are enterprises, small businesses, government agencies and non-profit organizations prepared for the disruption caused by Harvey and Irma?

If anything, these hurricanes are a stark reminder that all organizations need to have a disaster preparedness and business continuity plans in place to help with recovery from major natural catastrophes.

Join this interactive panel as we discuss:
- The aftermath of Hurricanes Harvey and Irma
- Impact on cybersecurity and how to avoid falling for a Harvey or Irma cyber scam
- Need for business continuity and disaster recovery planning
- Recommendations for crafting the right BCDR strategy and enabling recovery following a disaster

Is your security architecture up to date and able to defend against the latest cyber attacks? Every technology vendor will likely tell you that they have the most solid infrastructure, and that their roadmap is the one to follow. You may want to consider a fault-tolerant approach with security, as it can be more comprehensive than selecting one particular vendor for a specific requirement.

Fault-Tolerance means that you assume that a particular solution will fail, but are theoretically protected as another solution can be there if this failure happens.

Join this presentation and learn how fault tolerance can be deployed against breach scenarios and how it helps improve cybersecurity in 2017.

In light of recent data breaches and the increasing cost of a breach, it is clear why good IT and cybersecurity management is key to your business, especially when it comes to Business Continuity and Disaster Recovery planning. Join this presentation and learn about the human error in breaches, as well as what managers should know about their IT environment. Learn the steps you need to take today to ensure the right BCDR plans are in place before a disaster strikes.

Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.

Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.

With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.

This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.

The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups.

This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.

Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
· What is monitoring with discipline?
· How do I optimize my backup and recovery process?
· How can I extend my current data recovery protocol to encompass ransomware protection?

Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.

This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.

Hyperconvergence is a rapidly growing and evolving force in the IT infrastructure space. Emerging from the factory pre-configured racking programs of the big IT equipment suppliers, it quickly morphed into a variety of VM-centric architectures where compute, storage and networking (and more) are all integrated below the hypervisor and provide a unified platform to run virtual workloads on. The questions surrounding Data Protection are many: Is a DP mechanism even needed in a distributed cluster architecture that hyperconverged platforms typically drive? What’s the role of traditional backup software and appliances? Is physical server backup still important? What’s the optimum solution for backing up a hyperconverged platform? Is there an optimum solution?

In this presentation, some of today’s leading vendors will give their take on what the intersection of Hyperconvergence and Data Protection means for the end user.